Sciweavers

423 search results - page 42 / 85
» A Logical Approach to Dynamic Role-Based Access Control
Sort
View
ACSAC
2007
IEEE
14 years 3 months ago
Automated Vulnerability Analysis: Leveraging Control Flow for Evolutionary Input Crafting
We present an extension of traditional "black box" fuzz testing using a genetic algorithm based upon a Dynamic Markov Model fitness heuristic. This heuristic allows us t...
Sherri Sparks, Shawn Embleton, Ryan Cunningham, Cl...
WWW
2009
ACM
14 years 9 months ago
MASTH proxy: an extensible platform for web overload control
Many overload control mechanisms for Web based applications aim to prevent overload by setting limits on factors such as admitted load, number of server threads, buffer size. For ...
Vipul Mathur, Sanket Dhopeshwarkar, Varsha Apte
ARCS
2005
Springer
14 years 2 months ago
Reusable Design of Inter-chip Communication Interfaces for Next Generation of Adaptive Computing Systems
Abstract. The SoC (System-on-Chip) technology is used in small and flexible consumer electronic devices. SoCs include one or more microcontroller, memory, programmable logic, and ...
Vincent Kotzsch, Jörg Schneider, Günther...
CORR
2008
Springer
143views Education» more  CORR 2008»
13 years 9 months ago
A Type System for Data-Flow Integrity on Windows Vista
The Windows Vista operating system implements an interesting model of multi-level integrity. We observe that in this model, trusted code must participate in any information-flow a...
Avik Chaudhuri, Prasad Naldurg, Sriram K. Rajamani
ADHOC
2007
131views more  ADHOC 2007»
13 years 9 months ago
Perceptive admission control for wireless network quality of service
As wireless networks become more widely used, there is a growing need to support advanced services, such as multimedia streaming and voice over IP. Traditional approaches to guara...
Ian D. Chakeres, Elizabeth M. Belding-Royer, Josep...